What is the best way to create defensive code?

A. Develop traps in the software
B. Think like an attacker
C. Clean up the clutter
D. Create UML misuse cases


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following SmartArt graphic categories would be used to show a timeline?

A) Process B) Pyramid C) Cycle D) List

Computer Science & Information Technology

XML is an abbreviation for ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A ____ wavy underline indicates the text may be incorrect grammatically.

A. red B. green C. blue D. purple

Computer Science & Information Technology

Which of the following is not considered to be type of database client?

A. Local software B. Browsers C. Apps D. All of the above

Computer Science & Information Technology